Jump to content

Recommended Posts

Posted

I run it with java 8 without any problems, also don't run the one in this folder, it's pointing to lameguard, you won't be able to connect, change to gameserver.jar

Yes maybe its not a good solution for online, anyway its lame to open copycat servers, but for localhost testings its good.

Posted

Can some 1 tell me what version of java run this server files because i get strange error some 1 i hope can help i try tons of java version already .... P0xg8bC.jpg?1

same and when compilate it and not save it anything

Posted

Tha pack works, and everything is saved, its not that hard to make it work, make sure you install Java SE Development Kit 8 at least, or set version to 1.7 in the bat files.

Posted

Tha pack works, and everything is saved, its not that hard to make it work, make sure you install Java SE Development Kit 8 at least, or set version to 1.7 in the bat files.

Give me more info about how to exactly set to 1.7 java ...?

Posted

Guys i dont suggest you these files they are fully backdoored and u will have problems better choose something else than this one

I found only one for now but this files are huge and Ill need to see all of the code... Any 1 found something else than loginserver password backdoor?

Posted

I found only one for now but this files are huge and Ill need to see all of the code... Any 1 found something else than loginserver password backdoor?

 

this backdoor already posted on Ady Grierosu Topic who seling leaked tales files with fully backdoors they are the same like these u can check it

Posted

this backdoor already posted on Ady Grierosu Topic who seling leaked tales files with fully backdoors they are the same like these u can check it

True, files are exactly the same, and his topic is locked.

Posted

True, files are exactly the same, and his topic is locked.

 

someone posted already backdoors on his topic u can download them and check by your self also

Posted (edited)

someone posted already backdoors on his topic u can download them and check by your self also

Oh no im not going on live with those files, not even if they were clean. I only feel sad for people that paid for this.

Edited by thanosdk
Posted

Oh no im not going on live with those files, not even if they were clean. I only feel sad for people that paid for this.

 

many people lost already 500$ for something shared :)

Posted

many people lost already 500$ for something shared :)

Sad story, you have to be a very newbie(yes im polite) or clueless about l2 java to give such amount of money, I dont understand why people don't go for Advext64 or vangath with those prices, really, its like they want to be scammed or something.

Posted

Sad story, you have to be a very newbie(yes im polite) or clueless about l2 java to give such amount of money, I dont understand why people don't go for Advext64 or vangath with those prices, really, its like they want to be scammed or something.

 

most of these ppl dont know how to work on L2OFF platform thats why they geting scammed for L2J Files easy to use them easy to edit them thats why it happens :)

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.




  • Posts

    • Classic move "its not a virus, all antiviruses are just wrong." The moment someone starts yelling "FIND THE MALICIOUS CODE" and mocking heuristic detection, its usually because there is something shady in there… or they have no clue what heuristic detection even is. If your files was clean, you wouldn’t be this defensive or getting personal.   when half the AV vendors are throwing out names like Trojan.Win32.Kasidet, Trj/Chgt.AD, and Gen:Variant.Tedy.537463, maybe it’s not "heuristics", maybe its just a shady-ass .rar. If there is smoke you don't argue with the smoke detector, you check the kitchen. But hey, maybe they all got paid too, right? 🤷‍♂️ the argue comes down to trusting you (a nobody) versus AV vendors   Popular threat label trojan.tedy Threat categories trojan  Family labels tedy   can i call you Teddy from now on? yes i can Teddy               Dont forget it was not something generic or maybe suspicious it just got detected with its specific version. and not only Teddy's Teddy some others too Kaspersky says Kasidet trojan keylogger, spyware, classic nasty stuff. Bitdefender, GData, VIPRE? Tedy variant, an actual known malware family. Panda, QuickHeal, Sophos, Fortinet everyone sees something dirty in there. But sure, they’re all wrong, and you’re the cybersecurity messiah who cracked the code. You really expect people to believe that 10 independent vendors with zero incentive to conspire against your .rar just happened to flag your file as malware… by accident? Maybe try this next time: instead of uploading garbage and calling people “idiots” when they don’t trust it, just don’t upload malware. Problem solved.
    • https://github.com/gawric/Guide-L2Unity/blob/main/Guide/Pakets/Blowfish/General description.md   Perhaps you will find it useful piece of encryption and decryption code from Acis Interlude   I transferred these methods to Unity c# and everything works fine   https://ibb.co/DHhP0JYr   I think the first 2 bytes are the packet size. Third byte packet id And then the information itself   It's all there in l2j servers  
    • Hello, I’m working on decrypting the Init packet that the server sends to the client during login. This packet is treated specially and contains the Blowfish keys used to encrypt and decrypt subsequent packets. Although it isn’t encrypted irreversibly and should be reversible, I haven’t succeeded yet. My goal is to extract the Blowfish key to decrypt certain client packets without disrupting the normal session flow. I can inject a DLL to sniff the packets, and with that I plan to develop a module that extends the client’s functionality. For example, after logging in, this module would capture all the data the client receives (character data, etc.). Additionally, it could listen for real-time server events, enabling integrations with Discord SDKs or other systems, thereby expanding Lineage 2’s capabilities. Init packet(0x00) LoginServer. Currently in the java Cores I checked there is no decode function for this package, only encript.
    • whats password from the archivie ?
    • All that shit are false positives of the vanganth cliext, sources are well and who sell it is a big scammer
  • Topics

×
×
  • Create New...